System Administrator 2026
Which of the following is not a vulnerability of the data-link layer?
  • A. Mac address spoofing
  • B. VLAN circumvention
  • C. Switches may be forced for flooding traffic to all VLAN ports
  • D. Overloading of transport-layer mechanisms
Which of the following is not a vulnerability of the network layer?
  • A. Route spoofing
  • B. Identity & resource id vulnerability
  • C. Ip address spoofing
  • D. Weak or non-existent authentication
Which of the following is an example of physical layer vulnerability?
  • A. Mac address spoofing
  • B. Route spoofing
  • C. Weak or non-existent authentication
  • D. Keystroke & other input logging
Which of the following is an example of data-link layer vulnerability?
  • A. Physical theft of data
  • B. VLAN circumvention
  • C. Route spoofing
  • D. Weak or non-existent authentication
Which of the following is an example of network layer vulnerability?
  • A. Mac address spoofing
  • B. Physical theft of data
  • C. Route spoofing
  • D. Weak or non-existent authentication
In the network HTTP resources are located by
  • A. Uniform resource identifier
  • B. Unique resource locator
  • C. Unique resource identifier
  • D. Union resource locator
In HTTP pipelining ________________
  • A. Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
  • B. Multiple HTTP requests can not be sent on a single TCP connection
  • C. Multiple HTTP requests are sent in a queue on a single TCP connection
  • D. Multiple HTTP requests are sent at random on a single TCP connection